Security How-To

Security How-To
18 min read
| February 12, 2024
The Hedgehog Defense – Default Apps
Read More
Security How-To
6 min read
| February 6, 2024
Uncover Threats in Your Windows Environment with Sysmon
Read More
Security How-To
9 min read
| February 1, 2024
Incident Response for State and Local Governments
Read More
Security How-To
7 min read
| January 24, 2024
The steps municipalities can take to prepare for rising cyberattacks
Read More
Security How-To
3 min read
| January 23, 2024
Revolutionizing Government Cybersecurity: Ottawa County’s Journey with Blumira
Read More
Security How-To
17 min read
| January 22, 2024
4 Unexpected Ways to Strengthen State and Local Government Cybersecurity
Read More
Security How-To
13 min read
| January 9, 2024
How to Identify and Prevent Phishing in Businesses
Read More
Security How-To
4 min read
| December 19, 2023
Cybersecurity Detection and Protection—No Matter How You Say it
Read More
Security How-To
9 min read
| December 15, 2023
How to Get Cybersecurity Buy-in from Executive Leadership
Read More
Security How-To
9 min read
| December 12, 2023
How Manufacturing Companies Can Prevent Cyber-Attacks
Read More
Security How-To
11 min read
| November 20, 2023
Blumira’s SMB Cybersecurity Checklist
Read More
Security How-To
14 min read
| November 15, 2023
ESG: Strategies for Supercharging Security Teams
Read More
Security How-To
8 min read
| November 7, 2023
Correlating GeoIP Lookups
Read More
Security How-To
13 min read
| October 30, 2023
Incident Response Strategies for Ransomware
Read More
Security How-To
10 min read
| October 27, 2023
Building Effective Incident Response Procedures
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.